1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
oksian1 [2.3K]
3 years ago
14

Hai ill give 100 point if some won answers dis

Computers and Technology
2 answers:
Shalnov [3]3 years ago
8 0
Well, thanks for the points !!!
ANEK [815]3 years ago
5 0
What do you mean? Where the question?
You might be interested in
How many bytes are in 1 kilobyte of storage
topjm [15]

Answer:

1000

Explanation I SEARCHED IT Up

5 0
4 years ago
In computing terms What is AI?
Marat540 [252]

Answer:

Explanation:Artificial intelligence (AI) is the ability of a computer or a robot controlled by a computer to do tasks that are usually done by humans because they require human intelligence and discernment.

4 0
3 years ago
when a sender encrypts a message using their own private key, what security service is being provided to the recipient?
Rudik [331]

asymmetric encryption

4 0
3 years ago
Executive dashboards provide support primarily to analytical quantitative types of descisions. True or False
lana [24]

Answer: False

Explanation:

Executive dashboards is the tool that helps in displaying data, trend, metric KPI and other real-time data.This reporting gives information to organization and managers for working on any required improvement and way to expand their opportunities and work.

  • This tool does not focus on analytically qualitative based decision rather includes exception reporting of data and metrics, giving sight or big view of business performance etc rather than collecting data through surveys analysis or any interviewing process.
  • Therefore, the given statement is false.
4 0
3 years ago
What are the first and the last physical memory addressesaccessible using
Misha Larkins [42]

Answer

For First physical memory address,we add 00000 in segment values.

For Last physical memory address,we add 0FFFF in segment values.

<u>NOTE</u>-For addition of hexadecimal numbers ,you first have to convert it into binary then add them,after this convert back it in hexadecimal.

a)1000

For First physical memory address, we add 00000 in segment value

We add 0 at the least significant bit while calculating.

          1000<u>0</u> +00000 = 1000<u>0</u> (from note)

For Last physical memory address,We add 0 at the least significant bit while calculating.

   we add 0FFFF in segment value

           1000<u>0</u> +0FFFF =1FFFF    (from note)

b)0FFF

For First physical memory address,we add 00000 in segment value

We add 0 at the least significant bit while calculating.

     0FFF<u>0</u> +00000=0FFF0 (from note)

For Last physical memory address,We add 0 at the least significant bit while calculating.

   we add 0FFFF in segment value

           0FFF<u>0</u> +0FFFF =1FFEF (from note)

c)0001

For First physical memory address,we add 00000 in segment value

We add 0 at the least significant bit while calculating.

     0001<u>0</u> +00000=00010 (from note)

For Last physical memory address,We add 0 at the least significant bit while calculating.

   we add 0FFFF in segment value

           0001<u>0</u> +0FFFF =1000F (from note)

d) E000

For First physical memory address,we add 00000 in segment value

 We add 0 at the least significant bit while calculating.

    E000<u>0</u> +00000=E0000 (from note)

For Last physical memory address,We add 0 at the least significant bit while calculating.

   we add 0FFFF in segment value

           E000<u>0</u> +0FFFF =EFFFF (from note)

e) 1002

For First physical memory address,we add 00000 in segment value

 We add 0 at the least significant bit while calculating.

    1002<u>0</u> +00000=10020  (from note)

For Last physical memory address,We add 0 at the least significant bit while calculating.

   we add 0FFFF in segment value

           1002<u>0</u> +0FFFF =2001F (from note)

6 0
3 years ago
Other questions:
  • Prehistoric music was often written down on clay tablets
    10·1 answer
  • Which tool relies on the logged on user's certificate details to encrypt or decrypt files and folders? powershell bitlocker encr
    12·1 answer
  • Help please brainliest
    8·1 answer
  • What is the binary number system? ​
    15·1 answer
  • Which expression correctly determines that String s1 comes before String s2 in lexicographical order
    6·1 answer
  • if you were writing an essay about the major rivers of America which illustration would be the most helpful to your reader ​
    14·1 answer
  • The Brinley website will not let me search for questions anymore. It says “Search all you want in-app” and then covers the quest
    14·1 answer
  • You are designing an ecommerce web application that will scale to hundreds of thousands of concurrent users. Which database tech
    10·1 answer
  • ____ is an easy way to invitation through a web page​
    13·1 answer
  • Smart art is considered a​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!